Chaotic cryptography with modified inclusion method and indirect coupled chaotic synchronisation

Author(s):  
P. Canyelles-Pericas ◽  
R. Kharel ◽  
K. Busawon ◽  
I. Postlethwaite
2012 ◽  
Vol 24 (18) ◽  
pp. 2390-2397 ◽  
Author(s):  
Tandra Ghoshal ◽  
Tuhin Maity ◽  
Jeffrey F. Godsell ◽  
Saibal Roy ◽  
Michael A. Morris

Author(s):  
Amine Rahmani

Chaotic cryptography has been a well-studied domain over the last few years. Many works have been done, and the researchers are still getting benefit from this incredible mathematical concept. This paper proposes a new model for coloured image encryption using simple but efficient chaotic equations. The proposed model consists of a symmetric encryption scheme in which it uses the logistic equation to generate secrete keys then an affine recursive transformation to encrypt pixels' values. The experimentations show good results, and theoretic discussion proves the efficiency of the proposed model.


2021 ◽  
pp. 240-248
Author(s):  
Mahmood Khalel Ibrahem ◽  
Hussein Ali Kassim

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.


2020 ◽  
Vol 9 (2) ◽  
pp. 1208-1212

Presently advanced India notoriety, associations are proposing various structures concentrating on computerized encoding procedures. Because of the simplicity of replicating, altering, and altering of computerized archives and pictures has prompted encoding the data required for transmission and capacity. It clear that the connection between's the picture pixels to its neighborhood district is high, decreasing relationship between's the pixels esteem makes it hard to figure for the first picture and along these lines enhance the security. This paper presents a novel picture encoding strategy which at first improves the picture based on exchanging dim codes and pixel blast. The pixel blast utilizes very much characterized key that switches between the dim code of the picture pixels. Exploratory outcomes would demonstrate that the proposed pixel blast is sufficient for fractional encoding and upgrades security of the information. Further, it could likewise bolster as a deadly implement for any current calculation.


Polymers ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 381 ◽  
Author(s):  
Bin Xu ◽  
Huiming Zhang ◽  
He Bian

Delayed crosslinking polymer gel systems are widely utilized in deep profile control processes for water production control in oilfields. In this paper, a kind of delayed crosslinking amphiphilic polymer gel system with adjustable gelation time based on competitive inclusion was prepared and its delayed crosslinking gelling properties were studied. The amphiphilic polymer of P(acrylamide (AM)–sodium acrylate (NaA)–N-dodecylacrylamide (DDAM)) was synthesized and it showed much better salt resistance, temperature resistance, and shear resistance performance compared with hydrolyzed polyacrylamide (HPAM). Phenol can be controlled released from the the cavity of β-cyclodextrin (β-CD) ring in the presence of the hydrophobic group used as the competitive inclusion agent in the amphiphilic polymer backbone. Accordingly, the gelation time of the delayed crosslinking amphiphilic polymer gel system is closely related to release rate of the crosslinker from the the cavity of β-CD ring. This study screened an amphiphilic polymer with good salt resistance and temperature resistance performance, which can be used in high temperature and high salinity reservoirs, and provided a feasible way to control the gelation time of the polymer gel system by the competitive inclusion method.


2014 ◽  
Vol 2014 (0) ◽  
pp. _OS0522-1_-_OS0522-3_
Author(s):  
Takahiro OMI ◽  
Keiichiro TOHGO ◽  
Tomoyuki FUJII ◽  
Yoshinobu SHIMAMURA

2000 ◽  
Vol 68 (1) ◽  
pp. 3-10 ◽  
Author(s):  
H. M. Shodja ◽  
A. S. Sarvestani

Consider a double-inhomogeneity system whose microstructural configuration is composed of an ellipsoidal inhomogeneity of arbitrary elastic constants, size, and orientation encapsulated in another ellipsoidal inhomogeneity, which in turn is surrounded by an infinite medium. Each of these three constituents in general possesses elastic constants different from one another. The double-inhomogeneity system under consideration is subjected to far-field strain (stress). Using the equivalent inclusion method (EIM), the double inhomogeneity is replaced by an equivalent double-inclusion (EDI) problem with proper polynomial eigenstrains. The double inclusion is subsequently broken down to single-inclusion problems by means of superposition. The present theory is the first to obtain the actual distribution rather than the averages of the field quantities over the double inhomogeneity using Eshelby’s EIM. The present method is precise and is valid for thin as well as thick layers of coatings, and accommodates eccentric heterogeneity of arbitrary size and orientation. To establish the accuracy and robustness of the present method and for the sake of comparison, results on some of the previously reported problems, which are special cases encompassed by the present theory, will be re-examined. The formulations are easily extended to treat multi-inhomogeneity cases, where an inhomogeneity is surrounded by many layers of coatings. Employing an averaging scheme to the present theory, the average consistency conditions reported by Hori and Nemat-Nasser for the evaluation of average strains and stresses are recovered.


2017 ◽  
Vol 31 (02) ◽  
pp. 1650264 ◽  
Author(s):  
Dong Jiang ◽  
Yuanyuan Chen ◽  
Xuemei Gu ◽  
Ling Xie ◽  
Lijun Chen

Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.


Sign in / Sign up

Export Citation Format

Share Document